---
title: "BannerBomb3"
{% include toc title="Inhoudsopgave" %}
{% capture technical_info %}
<summary><em>Technical Details (optional)</em></summary>
To launch custom code, we exploit a flaw in the DSiWare Data Management window of the Settings application.
To accomplish this, we use your system's encryption key (movable.sed) to build a DSiWare backup that exploits the system.
For a more technical explanation, see [here](https://github.com/zoogie/Bannerbomb3).
{% endcapture %}
<details>{{ technical_info | markdownify }}</details>
{: .notice--info}
### Compatibility Notes
Deze instructies werken aan de consoles van de VS, Europa, Japan en Korea zoals aangegeven in de letters U, E, J, of K na de systeemversie.
Als je een Taiwanese console hebt (aangegeven door een T na de systeemversie), volg dan [deze pagina](bannerbomb3-fredtool-(twn)).
{: .notice--warning}
### Wat je nodig hebt
* Your `movable.sed` file from completing Seedminer or nimhax
#### Deel I - Voorbereiding
{% include_relative include/bb3-prep.txt %}
#### Section II - Hardware Button Check
{% include_relative include/safemodecheck.txt %}
___
### Next steps: Choose an exploit
If the camera appeared in the previous section, Safe Mode is likely to be working on your device.
If the camera appeared, continue to [Installing boot9strap (USM)](installing-boot9strap-(usm))
{: .notice--primary}
If the camera did NOT appear, continue to [Installing boot9strap (Fredtool)](installing-boot9strap-(fredtool))